Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Yongli T. [1 ]
Mingming W. [1 ]
Qing Y. [1 ]
Panke Q. [1 ]
Zongqu Z. [1 ]
机构
[1] Institute of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
来源
Journal of China Universities of Posts and Telecommunications | 2019年 / 26卷 / 04期
基金
中国国家自然科学基金;
关键词
Fixed dimension; H-IBBE; Lattice-based cryptography; Standard model;
D O I
10.19682/j.cnki.1005-8885.2019.1019
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption (H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user' s private key, and the trapdoor matrices ' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption. © 2019, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:70 / 79
页数:9
相关论文
共 50 条
  • [1] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [2] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263
  • [3] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [4] Novel hierarchical identity-based encryption scheme from lattice
    Ye Q.
    Hu M.-X.
    Tang Y.-L.
    Liu K.
    Yan X.-X.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (11): : 54 - 64
  • [5] Unbounded Hierarchical Identity-based Encryption in the Standard Model
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    Yang, Yang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (01): : 105 - 112
  • [6] Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme
    Wang Fenghe
    Wang Xuan
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 853 - 858
  • [7] New identity-based broadcast encryption with constant ciphertexts in the standard model
    Wu Q.
    Wang W.
    Journal of Software, 2011, 6 (10) : 1929 - 1936
  • [8] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [9] Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 207 - 211
  • [10] Efficient hierarchical identity based encryption scheme in the standard model over lattices
    Feng-he Wang
    Chun-xiao Wang
    Zhen-hua Liu
    Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 781 - 791